Multiple vulnerabilities including authorization bypass, DoS, arbitrary code execution and such other critical vulnerabilities were observed in various Cisco IOS and IOS XE devices in September 2020. To this, Cisco published a collated report of all 34 vulnerabilities as an advisory – ERP-74268.
In its semi-annual report, published on Sept 24, 2020, Cisco released bundles of advisory to address Cisco IOS and IOS XE multiple vulnerabilities, which fall into High to Critical in severity.
List of CVEs and their corresponding vulnerabilities/products are listed in affected products.
Affected Products/Devices:
Advisory
Mitigations
To determine whether any of Cisco IOS or IOS XE software release is vulnerable, Cisco recommends using Cisco Software Checker. To mitigate the risk, Cisco advises to update the products/devices with the latest patches.
Workaround/Mitigation Detection
Qualys Policy Compliance customers can evaluate workaround based on following Controls
-
- CVE-2020-3421 Cisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities
1. 19491 Status of the ‘one-minute high’ within the ‘parameter-map type inspect’ global configuration
2. 19492 Status of the ‘log dropped-packets’ within the ‘parameter-map type inspect’ global configuration
- CVE-2020-3421 Cisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities
-
- CVE-2020-3407 Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability
1. 19482 Status of the ‘number of ipv4 ACL count’ for ‘restconf ipv4 access-list name’ config command
2. 19483 Status of the ‘number of ipv6 ACL count’ for ‘restconf ipv6 access-list name’ ACL count config command
3. 19484 Status of the ‘number of ipv4 ACL count’ for ‘netconf-yang ssh ipv4 access-list name’ ACL count config command
4. 19485 Status of the ‘number of ipv6 ACL count’ for ‘netconf-yang ssh ipv6 access-list name’ ACL count config command
- CVE-2020-3407 Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability
-
- CVE-2020-3422 Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability
1. 19489 Status of the ‘ip sla key-chain’ global command configuration
2. 19490 Status of the ‘ip sla responder’ global command configuration
- CVE-2020-3422 Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability
-
- CVE-2020-3508 Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability
1. 19488 Status of the ‘arp entries interface-limit’ global configuration command
- CVE-2020-3508 Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability
-
- CVE-2020-3510 Cisco IOS XE Software for Catalyst 9200 Series Switches Umbrella Connector Denial of Service Vulnerability
1. 19486 List of the interfaces where the ‘umbrella out’ feature is enabled on the device (interfaces)
2. 19487 List of the interfaces where the ‘umbrella in’ feature is enabled on the device (interfaces)
- CVE-2020-3510 Cisco IOS XE Software for Catalyst 9200 Series Switches Umbrella Connector Denial of Service Vulnerability
Qualys Detection
Qualys customers can scan their network with QIDs 316712, 316713, 316714, 316715 and 316716 to detect vulnerable assets.
Please continue to follow Qualys Threat Protection for more coverage on latest vulnerabilities.
References
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74268
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-splitdns-SPWqpdGW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-COPS-VLD-MpbTvGEW
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-le-drTOB625
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mdns-dos-3tH6cA9J
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ISR4461-gKKUROhx
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-jw2DJmSv
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confacl-HbPtfSuO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-94ckG4G
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-ShFzXf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dclass-dos-VKh9D8k3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wpa-dos-cXshjerc